SSH event and webinar calendar


Upcoming events and webinars

Gitex Global 2022
october 10-14, 2022 | Dubai

SSH & Crestan at Gitex Global

Together with our partner Crestan, we will be present at the Gitex Global 2022 event in Dubai - one of the largest tech and startup events in the world. Join us in Hall 2, stand C30.

Learn more >

GovWare 2022 conference & exhibition
october 18-20, 2022 | singapore

SSH & DTAsia at GovWare 2022

Together with our partner DTAsia, we will be present at the GovWare 2022 event in Singapore. Join us at the Sands Expo and Convention Center at booths F23 and F27.

Learn more >

Past events and webinars



expert roundtable
October 4, 2022 | online

Threat monitoring and access management: Key elements of an effective OT cybersecurity strategy

Learn from the industry experts Tim Conway, Roman Sologub, and Rami Raulas about effective threat detection and response, OT network resilience, and how to build an OT security strategy.

Watch the webinar >



Security & risk Management Summit
September 12 – 14, 2022 | London, UK

Accelerating the Evolution of Security: Reframe and Simplify

Advanced cyberattack methods require advanced security approaches. But that makes your security strategy more and more complex. It's time to reframe and simplify. Join Gartner and industry experts to share and learn about valuable insights into your key strategic imperatives.

Learn more >



Identity & Access Management Summit
august 22 – 24, 2022 | Las Vegas, NV

Securing Constant Change: Enabling Resilient Business

Share valuable insights and get a comprehensive update on privileged access management (PAM), IAM programs and strategy, single sign-on, multifactor authentication (MFA), passwordless methods, and more.

Learn more >




free online session - expert roundtable
June 28, 2022 | online

How is Ukraine defending itself against cyberattacks?

Four cybersecurity experts come together to discuss lessons learned from the currently ongoing cyberwar in Ukraine and how businesses can put these learnings into practice to defend themselves.

Join this webinar by a battle-tested Ukrainian cybersecurity service provider ISSP and a leading European defensive cybersecurity solution provider SSH.

Watch the recording >



Critical Communications World 2022
21-23 June 2022 | Messe Wien, Austria

Serving the critical communications sector for more than 20 years

Stay at the forefront of critical communications as the sector unites for crucial knowledge sharing, updates on cutting-edge products and invaluable networking.

Learn more >


identity & access management summit
May 12-13, 2022 | London, uk

Identity and Access Management (IAM)

Get the latest insights on identity governance and administration, security, and privacy.

Join our CEO, Teemu Tunkelo, for his presentation about the latest developments in defensive cybersecurity. On Friday, May 13th, 2022 at 11:15, room Arora 6.

Come and meet us at the booth 501.

Learn more >


European identity and cloud conference 2022
May 10-13, 2022 | Berlin, Germany

Decentralized identity & cybersecurity

Insights from the industry leaders into the latest cybersecurity trends, digital identity, and identity management.

Learn more >


cybersecurity nordic 2022
May 12-13, 2022 | helsinki, finland

Politics, economy, reality and future of cybersecurity

Leading cybersecurity specialists from the Nordics meet to provide insights into current issues within the field of cybersecurity.

Meet us at the booth SI3.

Learn more >


GISEC global 2022

For a cyber-safe, interconnected world

One of the most established networking and business events for the cyber and IT security industry. Drive strategic collaborations and an empowering exchange of new-age cybersecurity tactics and ideas.


Online event

Fix a critical hole in your security posture

A single SSH key can make you fail your next IT audit or turn you into tomorrow’s beach headline. Join our co-hosted webinar with our friends at ISACA to learn how to use purpose-built software and automation to prevent this.
Webinar co-hosted by ISMG

Can SMEs automate access to multi-cloud IT?

Learn how medium-sized companies can automate most of their manual privileged access management (PAM) tasks, deploy the solution within days and manage the access of internal and external IT workforce with minimal risk of privilege abuse. 

On-demand Webinar with OneLogin

Saving admins from themselves

Multi-cloud environments (AWS, Azure, Google Cloud) and DevOps require cloud-speed operations. They have also opened new types of vulnerabilities that need new types of counter measures.

IDM London 2019

Say no to standing privileges, go credentialess

Why permanent credentials are a risk in IT and how critical IT environments can be made passwordless and credentialess. 

IDM Utrecht 2019

Modern access mgmt for hybrid and multi-cloud 

 Dynamic hybrid and cloud environments have different privileged user types who need to access shifting target servers. While cloud environments can be complex and ever-changing, many legacy solutions are built on yesterday’s architecture and tend to cause huge operational and business friction.